On 01/13/2015 04:47 PM, Jim Fehlig wrote:
+++ b/src/Makefile.am
@@ -1005,6 +1005,10 @@ XENCONFIG_SOURCES =
\
xenconfig/xen_common.c xenconfig/xen_common.h \
xenconfig/xen_sxpr.c xenconfig/xen_sxpr.h \
Eric Blake wrote:
On 01/13/2015 08:53 AM, Jim Fehlig wrote:
From: Kiarie Kahurani davidkiar...@gmail.com
add tests for the xen_xl config parser
Signed-off-by: Kiarie Kahurani davidkiar...@gmail.com
Signed-off-by: Jim Fehlig jfeh...@suse.com
---
V4:
Only build xlconfigtest when libxl
On 1/12/2015 at 09:54 PM, in message 1421070890.26317.69.ca...@citrix.com,
Ian Campbell ian.campb...@citrix.com wrote:
On Mon, 2015-01-12 at 00:01 -0700, Chun Yan Liu wrote:
On 1/8/2015 at 08:26 PM, in message
1420719995.19787.62.ca...@citrix.com,
Ian
Campbell
On 01/13/2015 07:53 PM, Pasi Kärkkäinen wrote:
Hi,
On Tue, Jan 13, 2015 at 05:22:58PM +0100, Juergen Gross wrote:
The locking in scsifront_dev_reset_handler() is obviously wrong. In
case of a full ring the host lock is aquired twice.
Fixing this issue enables to get rid of the endless fo loop
On 13/01/15 16:46, Ian Campbell wrote:
We need to track everything for interrupt assignment to a guest/dom0. So
if the guest ask for a free vIRQ we can give it directly.
Makes sense.
In that case you 0/4 mail doesn't fully describe the use case for the
series, since it talks about the
On 01/13/2015 12:56 AM, Jan Beulich wrote:
On 12.01.15 at 18:36, edmund.h.wh...@intel.com wrote:
On 01/12/2015 02:00 AM, Jan Beulich wrote:
On 10.01.15 at 00:04, edmund.h.wh...@intel.com wrote:
On 01/09/2015 02:41 PM, Andrew Cooper wrote:
Having some non-OS part of the guest swap the EPT
Ian Campbell writes (Re: [PATCH RFC] make error codes a formal part of the
ABI):
On Tue, 2015-01-13 at 16:21 +, Jan Beulich wrote:
There's on small block commented with TBD left in the public header.
This is the main reason for the submission being RFC. While we don't
currently use
Wei Liu writes ([PATCH v3 05/19] libxl: add vmemrange to
libxl__domain_build_state):
A vnode consists of one or more vmemranges (virtual memory range). One
example of multiple vmemranges is that there is a hole in one vnode.
I'm finding this series a bit oddly structured. This patch, for
Wei Liu writes (Re: [PATCH v3 18/19] libxlutil: nested list support):
On Tue, Jan 13, 2015 at 03:52:48PM +, Ian Jackson wrote:
This commit message is very brief. For example, under the heading of
`Rework internal representation of setting' I would expect a clear
description of every
Increase maxmem before calling xc_domain_populate_physmap_exact to
avoid the risk of running out of guest memory. This way we can also
avoid complex memory calculations in libxl at domain construction
time.
This patch fixes an abort() when assigning more than 4 NICs to a VM.
Signed-off-by:
From: Liang Li liang.z...@intel.com
Use the 'xl pci-attach $DomU $BDF' command to attach more than
one PCI devices to the guest, then detach the devices with
'xl pci-detach $DomU $BDF', after that, re-attach these PCI
devices again, an error message will be reported like following:
libxl:
As netfront as evolved to handle different sorts of skbs the code to
fill a Tx requests has been copy and pasted several times. The series
refactors this and a few other areas.
The first patch is to a Xen header but this can be merged via
net-next.
David
A function to count the number of slots an skb needs is more useful
than one that counts the slots needed for only the frags.
Signed-off-by: David Vrabel david.vra...@citrix.com
---
drivers/net/xen-netfront.c | 13 +++--
1 file changed, 7 insertions(+), 6 deletions(-)
diff --git
On 13/01/15 14:25, Julien Grall wrote:
This series has been tested on Midway by assigning the secondary network card
to a guest (see instruction below). I plan to do futher testing on other
boards.
I forgot to precise that only changes has only been build tested on x86.
Regards,
--
Julien
Hi all,
This series contains a couple of change for the grant-table header.
The first one only removed an unused/misplaced define. The second one,
increase the number of grant frame iniatialize when the domain is created.
Regards,
Julien Grall (2):
xen/arm: Remove the define INVALID_GFN from
On 13.01.15 at 17:57, ian.jack...@eu.citrix.com wrote:
Ian Campbell writes (Re: [PATCH RFC] make error codes a formal part of the
ABI):
On Tue, 2015-01-13 at 16:21 +, Jan Beulich wrote:
There's on small block commented with TBD left in the public header.
This is the main reason for
Wei Liu writes ([PATCH v3 07/19] libxl: x86: factor out e820_host_sanitize):
This function gets the machine E820 map and sanitize it according to PV
guest configuration.
This will be used in later patch. No functional change introduced in
this patch.
Thanks. It is easy to see that this is
On Tue, 2015-01-13 at 16:57 +, Ian Jackson wrote:
Ian Campbell writes (Re: [PATCH RFC] make error codes a formal part of the
ABI):
On Tue, 2015-01-13 at 16:21 +, Jan Beulich wrote:
There's on small block commented with TBD left in the public header.
This is the main reason for
On Tue, 2015-01-13 at 16:57 +, Julien Grall wrote:
(CC Jan)
I think you forget, I added him.
@@ -49,6 +49,21 @@ int domain_vtimer_init(struct domain *d)
{
d-arch.phys_timer_base.offset = NOW();
d-arch.virt_timer_base.offset = READ_SYSREG64(CNTPCT_EL0);
+
+/* At
Eliminate all the duplicate code for making Tx requests by
consolidating them into a single xennet_make_one_txreq() function.
xennet_make_one_txreq() and xennet_make_txreqs() work with pages and
offsets so it will be easier to make netfront handle highmem frags in
the future.
Signed-off-by:
pfn_to_mfn(page_to_pfn(p)) is a common use case so add a generic
helper for it.
Signed-off-by: David Vrabel david.vra...@citrix.com
---
include/xen/page.h |5 +
1 file changed, 5 insertions(+)
diff --git a/include/xen/page.h b/include/xen/page.h
index 12765b6..c5ed20b 100644
---
Wei Liu writes ([PATCH v3 03/19] libxc: allocate memory with vNUMA information
for PV guest):
...
diff --git a/tools/libxc/include/xc_dom.h b/tools/libxc/include/xc_dom.h
index 07d7224..c459e77 100644
--- a/tools/libxc/include/xc_dom.h
+++ b/tools/libxc/include/xc_dom.h
@@ -167,6 +167,11 @@
On 13/01/15 16:57, Julien Grall wrote:
(CC Jan)
Forgot to really CC Jan for the bool stuff.
Hi Ian,
On 13/01/15 16:46, Ian Campbell wrote:
vgic_reserve_irq returns a boolean:
Please use true/false then.
In Xen we have xen/stdbool.h which differs from normal stdboot.h. I'm
not sure
On Tue, Jan 13, 2015 at 04:50:11PM +, Jan Beulich wrote:
On 13.01.15 at 13:11, wei.l...@citrix.com wrote:
+void init_vnuma_info(void)
+{
+int rc, retry = 0;
+struct xen_vnuma_topology_info vnuma_topo;
+
+vcpu_to_vnode = scratch_alloc(sizeof(uint32_t) *
On Tue, Jan 13, 2015 at 05:02:10PM +, Ian Jackson wrote:
Wei Liu writes ([PATCH v3 05/19] libxl: add vmemrange to
libxl__domain_build_state):
A vnode consists of one or more vmemranges (virtual memory range). One
example of multiple vmemranges is that there is a hole in one vnode.
On 13/01/15 17:18, Ian Campbell wrote:
On Tue, 2015-01-13 at 16:57 +, Julien Grall wrote:
(CC Jan)
I think you forget, I added him.
@@ -49,6 +49,21 @@ int domain_vtimer_init(struct domain *d)
{
d-arch.phys_timer_base.offset = NOW();
d-arch.virt_timer_base.offset =
On Tue, Jan 13, 2015 at 05:05:26PM +, Ian Jackson wrote:
Wei Liu writes ([PATCH v3 03/19] libxc: allocate memory with vNUMA
information for PV guest):
...
diff --git a/tools/libxc/include/xc_dom.h b/tools/libxc/include/xc_dom.h
index 07d7224..c459e77 100644
---
On Mon, 12 Jan 2015, Stefano Stabellini wrote:
On Wed, 3 Dec 2014, Don Slutz wrote:
From: Stefano Stabellini stefano.stabell...@eu.citrix.com
Increase maxmem before calling xc_domain_populate_physmap_exact to
avoid the risk of running out of guest memory. This way we can also
avoid
On Tue, Jan 13, 2015 at 12:11:43PM +, Wei Liu wrote:
The algorithm is more or less the same as the one used for PV guest.
Libxc gets hold of the mapping of vnode to pnode and size of each vnode
then allocate memory accordingly.
Could you split this patch in two? One part for the adding of
Wei Liu writes ([PATCH v3 08/19] libxl: functions to build vmemranges for PV
guest):
Introduce a arch-independent routine to generate one vmemrange per
vnode. Also introduce arch-dependent routines for different
architectures because part of the process is arch-specific -- ARM has
yet have
On 01/12/2015 09:45 AM, Ed White wrote:
On 01/12/2015 08:43 AM, Andrew Cooper wrote:
On 09/01/15 21:26, Ed White wrote:
In preparation for selectively enabling hardware #VE in a later patch,
set suppress #VE on all EPTE's on #VE-capable hardware.
Suppress #VE should always be the default
-Original Message-
From: Daniel De Graaf [mailto:dgde...@tycho.nsa.gov]
Sent: Tuesday, January 13, 2015 11:54 PM
To: Xu, Quan; xen-devel@lists.xen.org
Cc: stefano.stabell...@eu.citrix.com; samuel.thiba...@ens-lyon.org;
ian.campb...@citrix.com; ian.jack...@eu.citrix.com;
On Tue, Jan 13, Doug McMillan wrote:
Also quick question if I am understanding my remaining issue [tmpfs: Bad mount
option context] as described by a previous thread. Until
the code that generates it changes I need to manually change
var-lib-xenstored.mount from
...
Or am I misunderstanding
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, January 14, 2015 12:06 AM
On 13.01.15 at 17:00, george.dun...@eu.citrix.com wrote:
Another option I was thinking about: Before assigning a device to a
guest, you have to unplug the device and assign it to pci-back (e.g.,
Ed White edmund.h.wh...@intel.com 01/13/15 9:03 PM
On 01/13/2015 11:01 AM, Andrew Cooper wrote:
One thing I have noticed while looking at the #VE stuff that EPT also
supports A/D tracking, which might be quite a nice optimisation and
forgo the need for p2m_ram_logdirty, but I think this
Ed White edmund.h.wh...@intel.com 01/13/15 10:32 PM
On 01/13/2015 12:45 PM, Andrew Cooper wrote:
On 13/01/15 20:02, Ed White wrote:
The set of mfn's is the same, but I do allow gfn-mfn mappings to be
modified under certain circumstances. One use of this is to point the
same VA to different
On Wed, 2015-01-07 at 15:32 +, Ian Campbell wrote:
The first Xen technical call will be at:
Wed 14 Jan 17:00:00 GMT 201
`date -d @1421254800`
See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html
for more information on the call.
In the absence of any further
On 13/01/15 12:11, Wei Liu wrote:
From libxc's point of view, it only needs to know vnode to pnode mapping
and size of each vnode to allocate memory accordingly. Add these fields
to xc_dom structure.
The caller might not pass in vNUMA information. In that case, a dummy
layout is generated
On 01/13/2015 11:01 AM, Andrew Cooper wrote:
On 09/01/15 21:26, Ed White wrote:
This set of patches adds support to hvm domains for EPTP switching by
creating
multiple copies of the host p2m (currently limited to 10 copies).
The primary use of this capability is expected to be in scenarios
Hi,
On Tue, Jan 13, 2015 at 05:22:58PM +0100, Juergen Gross wrote:
The locking in scsifront_dev_reset_handler() is obviously wrong. In
case of a full ring the host lock is aquired twice.
Fixing this issue enables to get rid of the endless fo loop with an
explicit break statement.
Is this
On Mon, Dec 15, 2014 at 02:58:26PM +, Stefano Stabellini wrote:
On Tue, 9 Dec 2014, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
This lets you build a kernel which can support xen dom0
or xen guests by just using:
make xenconfig
on both x86 and arm64
Hey
I was wondering if there would be any plans for configure.ac
(or the m4 scripts) to have an --enable-xsm which would set
XSM_ENABLE (or FLASK_ENABLE) to true?
Right now by default to build with XSM one has to manually change
the Config.mk ENABLE_XSM option to 'y'.
Thanks.
On 01/12/2015 09:48 AM, Andrew Cooper wrote:
On 09/01/15 21:26, Ed White wrote:
diff --git a/xen/include/asm-x86/p2m.h b/xen/include/asm-x86/p2m.h
index 5f7fe71..8193901 100644
--- a/xen/include/asm-x86/p2m.h
+++ b/xen/include/asm-x86/p2m.h
@@ -193,6 +193,9 @@ struct p2m_domain {
*
Some platform (such as the VFP Base AEMv8 model) has a memory mapped
timer. We don't want DOM0 use this timer rather than the generic ARM
timer. So blacklist it for all platforms.
Signed-off-by: Julien Grall julien.gr...@linaro.org
---
This patch is candidate to backport for Xen 4.5 and Xen
Hello Luis,
On 13/01/15 19:03, Luis R. Rodriguez wrote:
diff --git a/kernel/configs/xen.config b/kernel/configs/xen.config
new file mode 100644
index 000..d2ec010
--- /dev/null
+++ b/kernel/configs/xen.config
@@ -0,0 +1,30 @@
+# generic config
+CONFIG_XEN=y
+CONFIG_XEN_DOM0=y
On 13/01/15 12:11, Wei Liu wrote:
@@ -408,6 +413,49 @@ static void dump_numa(unsigned char key)
for_each_online_node ( i )
printk(Node %u: %u\n, i, page_num_node[i]);
+
+if ( !d-vnuma )
+continue;
Nit - extraneous whitespace.
+
+
On 13 January 2015 at 18:24, Stefano Stabellini
stefano.stabell...@eu.citrix.com wrote:
The following changes since commit 7d5ad15d17f26dd4f9ff5f3491828bc34e74f28c:
Merge remote-tracking branch 'remotes/stefanha/tags/net-pull-request' into
staging (2015-01-12 11:13:24 +)
are available
On Jan 12, 3:53pm, Xu, Quan wrote:
} Subject: RE: [Xen-devel] Architecture for dom0 integrity measurements.
Hi, Dr. G.W. Wettstein
Hi Quan, thanks for taking the time to reply.
cc Graaf who is vTPM / XSM maintainer.
Also cc Stefano.
Greetings to everyone else as well.
-Original
On Tue, Jan 13, 2015 at 01:46:50PM +, Wei Liu wrote:
On Tue, Jan 13, 2015 at 04:02:12PM +0800, Chao Peng wrote:
Make some internal routines common so that total/local memory bandwidth
monitoring in the next patch can make use of them.
Signed-off-by: Chao Peng
Hi,
[Goal]
I want to investigate the impact of the shared cache on the
performance of workload in guest domain.
I also want to partition the shared cache via page coloring mechanism
so that guest domains can use different cache colors of shared cache
and will not have interference in the shared
On Tue, 13 Jan 2015, Sander Eikelenboom wrote:
Monday, January 12, 2015, 4:01:00 PM, you wrote:
On 12/01/15 13:39, Jiang Liu wrote:
Commit b81975eade8c (x86, irq: Clean up irqdomain transition code)
breaks xen IRQ allocation because xen_smp_prepare_cpus() doesn't invoke
On Mon, Jan 12, Ian Campbell wrote:
@devs -- we obviously need to do something about this (too late for 4.5,
but for 4.6 + backport). Perhaps there is some alternative systemd
construction which disassociates the actual path from the abstract
service xenstored dir mounted?
I dont think we
On 12.01.15 at 18:36, edmund.h.wh...@intel.com wrote:
On 01/12/2015 02:00 AM, Jan Beulich wrote:
On 10.01.15 at 00:04, edmund.h.wh...@intel.com wrote:
On 01/09/2015 02:41 PM, Andrew Cooper wrote:
Having some non-OS part of the guest swap the EPT tables and
accidentally turn a DMA buffer
Add Memory Bandwidth Monitoring(MBM) for VMs. Two types of monitoring
are supported: total and local memory bandwidth monitoring. To use it,
CMT should be enabled in hypervisor.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
---
docs/man/xl.pod.1 |9 +
Make some internal routines common so that total/local memory bandwidth
monitoring in the next patch can make use of them.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
---
tools/libxl/libxl_psr.c | 44 -
tools/libxl/xl_cmdimpl.c | 54
L3 event mask indicates the event types supported in host, including
cache occupancy event as well as local/total memory bandwidth events
for Memory Bandwidth Monitoring(MBM). Expose it so all these events
can be monitored in user space.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
- space: remove space after '(' or before ')' in 'if' condition;
- indention: align function definition/call arguments;
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Acked-by: Wei Liu wei.l...@citrix.com
---
tools/libxc/include/xenctrl.h |8
tools/libxc/xc_psr.c |
Changes from v2:
* Remove the usage of static to cache data in xc;
NOTE: Other places that already existed before are not touched due to
the needs for API change. Will fix in separate patch if desirable.
* Coding style;
Changes from v1:
* Move event type check from xc to xl;
* Add retry
This is the tools side wrapper for XEN_SYSCTL_PSR_CMT_get_l3_event_mask
of XEN_SYSCTL_psr_cmt_op.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
---
tools/libxc/include/xenctrl.h |1 +
tools/libxc/xc_psr.c | 17 +
tools/libxl/libxl.h |1 +
From: Palik, Imre im...@amazon.de
In Dom0's the use of the TSC clocksource (whenever it is stable enough to
be used) instead of the Xen clocksource should not cause any issues, as
Dom0 VMs never live-migrated. The TSC clocksource is somewhat more
efficient than the Xen paravirtualised
flight 33382 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33382/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 32648
build-i386-libvirt
There was no v2 (v2 was not created properly).
Yes, 1/4 was the cover letter. And 4/4 was not correct.
Thank you for applying the patches.
On Mon, Jan 12, 2015 at 11:29 PM, Ian Campbell ian.campb...@citrix.com wrote:
On Tue, 2014-10-21 at 18:04 +0100, George Dunlap wrote:
Just getting back to
flight 33377 linux-linus real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33377/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-intel 5 xen-boot fail REGR. vs. 32879
On Thu, 2014-12-11 at 14:45 +0100, Vitaly Kuznetsov wrote:
Add new xc_domain_soft_reset() function which performs so-called 'soft reset'
for an HVM domain. It is being performed in the following way:
- Save HVM context and all HVM params;
- Devour original domain with XEN_DOMCTL_devour;
-
2015-01-13 11:58 GMT+00:00 Ian Campbell ian.campb...@citrix.com:
On Mon, 2014-11-03 at 10:11 +, Frediano Ziglio wrote:
Add this new platform to Xen.
This platform require specific code to initialize CPUs.
What is the bootwrapper? Are you running this on real silicon or on an
emulator?
On Thu, 2014-12-11 at 14:45 +0100, Vitaly Kuznetsov wrote:
Supported for HVM guests only.
Is it specifically PVHVM guests, or are unaware HVM guests also
supported? (I think the answer is that an unaware HVM guest has no way
to trigger a soft reset, so maybe it's moot...)
diff --git
The check to avoid mapping disabled device in DOM0 was added in the anticipation
of the device passthrough. But, a brand new property will be added later to mark
device which will passthrough. At the same time, remove the memory type
check because those nodes has been blacklisted.
Futhermore,
Xen has to release IRQ routed to a domain in order to reuse later. Currently
only SPIs can be routed to the guest so we only need to browse SPIs for a
specific domain.
Futhermore, a guest can crash and let the IRQ in an incorrect state (i.e has
not being EOIed). Xen will have to reset the IRQ in
Xen is only able to handle one GIC controller. Some platform may contain
other interrupt controller.
Make sure to only translate IRQ mapped into the GIC handled by Xen.
Signed-off-by: Julien Grall julien.gr...@linaro.org
---
Changes in v3:
- Patch was previously sent a separate
Actually Xen is assuming that the virtual IRQ will always be the same as IRQ.
Modify route_guest_irq to take the virtual IRQ in parameter and let Xen
assign a different IRQ number. Also store the vIRQ in the desc action to
easily retrieve easily the IRQ target when we need to inject the
Each domain may have a different number of IRQs depending on the devices
assigned to it.
Rather re-using the number of IRQs used by the hardwared GIC, let the
toolstack specify the number of SPIs when the domain is created. This
will avoid to waste memory.
To calculate the number of SPIs, we
Let the user to pass additional nodes to the guest device tree. For this
purpose, everything in the node /passthrough from the partial device tree will
be copied into the guest device tree.
The node /aliases will be also copied to allow the user to define aliases
which can be used by the guest
Hello all,
This is the third version of this patch series to add support for platform
device passthrough on ARM.
Compare to the previous version [1], the automatic mapping of MMIO/IRQ and
the generation of the device tree has been dropped.
Instead the user will have to:
- Map manually
Flask code already provides an helper to copy a string from guest. In a later
patch, the new DT hypercalls will need a similar function.
To avoid code duplication, copy the flask helper (flask_copying_string) to
common code:
- Rename into safe_copy_string_from_guest
- Add comment to
This new function will correctly initialize the IOMMU page table for the
current domain.
Also use it in iommu_assign_dt_device even though the current IOMMU
implementation on ARM shares P2M with the processor.
Signed-off-by: Julien Grall julien.gr...@linaro.org
Cc: Jan Beulich jbeul...@suse.com
Currently Xen only supports SPIs routing for guest, add a function
is_assignable_irq to check if we can assign a given IRQ to the guest.
Secondly, make sure the vIRQ is not the greater that the number of IRQs handle
to the vGIC and it's an SPIs.
Thirdly, when the IRQ is already assigned to the
The structure pending_irq is initialized on the same way in 2 differents
place. Introduce vgic_init_pending_irq to avoid code duplication.
Also move the setting of the irq field in this function as we need to
initialize it once rather than every time an IRQ is injected to the guest.
Finally, use
On Tue, 2015-01-13 at 14:09 +, Frediano Ziglio wrote:
2015-01-13 11:58 GMT+00:00 Ian Campbell ian.campb...@citrix.com:
On Mon, 2014-11-03 at 10:11 +, Frediano Ziglio wrote:
Add this new platform to Xen.
This platform require specific code to initialize CPUs.
What is the
On 12/01/15 15:43, David Vrabel wrote:
From: Jenny Herbert jenny.herb...@citrix.com
Use the foreign page flag in netback to get the domid and grant ref
needed for the grant copy. This signficiantly simplifies the netback
code and makes netback work with foreign pages from other backends
On Tue, Jan 13, 2015 at 04:02:13PM +0800, Chao Peng wrote:
Add Memory Bandwidth Monitoring(MBM) for VMs. Two types of monitoring
are supported: total and local memory bandwidth monitoring. To use it,
CMT should be enabled in hypervisor.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
On Thu, 2014-12-11 at 14:45 +0100, Vitaly Kuznetsov wrote:
New libxl__domain_soft_reset_destroy() is an internal-only
version of libxl_domain_destroy() which follows the same domain
destroy path with the only difference: xc_domain_destroy() is
being avoided so the domain is not actually being
On Tue, 2015-01-13 at 12:56 +, Wei Liu wrote:
On Tue, Jan 13, 2015 at 01:19:05PM +0100, Olaf Hering wrote:
On Tue, Jan 13, Ian Campbell wrote:
On Fri, 2015-01-09 at 14:32 +, Wei Liu wrote:
A pkg-config file for libxl. It also contains two variables
(xenfirmwaredir and
TODO: Update the commit message
A device node is described by a path. It will be used to retrieved the
node in the device tree and assign the related device to the domain.
Only device protected by an IOMMU can be assigned to a guest.
Signed-off-by: Julien Grall julien.gr...@linaro.org
Cc: Ian
At 13:53 + on 13 Jan (1421153637), Ian Campbell wrote:
On Thu, 2014-12-11 at 14:45 +0100, Vitaly Kuznetsov wrote:
+gmfn = mfn_to_gmfn(d, mfn);
(I haven't thought about it super hard, but I'm taking it as given that
this approach to kexec is going to be needed for ARM too,
Always fully coalesce guest Rx packets into the minimum number of ring
slots. Reducing the number of slots per packet has significant
performance benefits (e.g., 7.2 Gbit/s to 11 Gbit/s in an off-host
receive test).
However, this does increase the number of grant ops per packet which
decreases
flight 33391 seabios real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33391/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-pvh-intel 9 guest-start fail never pass
test-amd64-i386-libvirt 9
On Mon, 2015-01-12 at 16:52 +, Ian Jackson wrote:
Dario Faggioli writes ([OSSTEST PATCH] make-flight: reorganize scheduling
related test jobs):
Scheduling related tests are ok to run on ARM, so do
not cut them off. They also do not depend on a
particular Dom0 architecture.
The
The physdev sub-hypercalls PHYSDEVOP_{,map}_pirq allow the toolstack to
assign/deassign a physical IRQ to the guest (via the config options irqs
for xl). The x86 version is using them with PIRQ (IRQ bound to an event
channel). As ARM doesn't have a such concept, we could reuse it to bound
a
On ARM the virtual GIC may differ between each guest (emulated GIC version,
number of SPIs...). Those informations are already known at the domain creation
and can never change.
For now only the gic_version is set. In long run, there will be more parameters
such as the number of SPIs. All will be
Signed-off-by: Julien Grall julien.gr...@linaro.org
Acked-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
Cc: Jan Beulich jbeul...@suse.com
---
Changes in v3:
- Add Stefano's ack
Changes in v2:
- Don't move the call in common code.
---
xen/arch/arm/domctl.c | 11
Currently the function to translate IRQ from the device tree is set
unconditionally to be able to be able to retrieve serial/timer IRQ before the
GIC has been initialized.
It assumes that the xlate function won't never changed. We may also need to
have the primary interrupt controller very
The option dtdev will be used to passthrough a non-PCI device described
in the device tree to a guest.
Signed-off-by: Julien Grall julien.gr...@linaro.org
Cc: Ian Jackson ian.jack...@eu.citrix.com
Cc: Wei Liu wei.l...@citrix.com
---
Changes in v2:
- libxl_device_dt has been rename to
The partial device tree may contains phandle. The Device Tree Compiler
tends to allocate the phandle from 1.
Reserve the ID 65000 for the GIC phandle. I think we can safely assume
that the partial device tree will never contain a such ID.
Signed-off-by: Julien Grall julien.gr...@linaro.org
Cc:
The toolstack may not have deassign every device used by a guest.
Therefore we have to go through the device list and removing them before
asking the IOMMU drivers to release memory for this domain.
This can be done by moving the call to the release function when we
relinquish the resources. The
On Tue, Jan 13, 2015 at 02:05:17PM +, David Vrabel wrote:
Always fully coalesce guest Rx packets into the minimum number of ring
slots. Reducing the number of slots per packet has significant
performance benefits (e.g., 7.2 Gbit/s to 11 Gbit/s in an off-host
receive test).
Good number.
On Tue, 2015-01-13 at 13:52 +0800, Wen Congyang wrote:
On 12/01/2014 10:21 PM, Euan Harris wrote:
Tools debug builds are built with optimization level -O1, inherited from
the CFLAGS definition in StdGNU.mk. Optimizations confuse the debugger,
and the comment justifying -O1 in StdGNU.mk
On Tue, Jan 13, 2015 at 10:00:58AM +, Jan Beulich wrote:
On 13.01.15 at 09:02, chao.p.p...@linux.intel.com wrote:
L3 event mask indicates the event types supported in host, including
cache occupancy event as well as local/total memory bandwidth events
for Memory Bandwidth
This was disabled by default in Xen 4.4. Since xend has now been
removed from the tree I don't believe anything is using it.
We need to pass an explicit CONFIG_BLKTAP1=n to qemu-xen-traditional
otherwise it defaults to y and doesn't build.
This patch does all the ground work, the tools/blktap
Now that it is unhooked we can just remove it.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
.gitignore |5 -
.hgignore |5 -
tools/blktap/Makefile | 13 -
tools/blktap/README |
Ed White writes (Re: [PATCH 00/11] Alternate p2m: support multiple copies of
host p2m):
On 01/12/2015 10:00 AM, Ian Jackson wrote:
To support this code in-tree, I think we will need Open Source code
for exercising it, surely ?
I'm hoping that, as Andrew says, there will be people
1 - 100 of 222 matches
Mail list logo